随便翻翻 & Men Lists & Words Lists

这是一个摘抄系列的合集。时间跨度至少有半年，14 年有意思的就这部分了。

Words List 01

KML - Keyhole Markup Language

Keyhole Markup Language (KML) is an XML notation for expressing geographic annotation and visualization within Internet-based, two-dimensional maps and three-dimensional Earth browsers. KML was developed for use with Google Earth, which was originally named Keyhole Earth Viewer. It was created by Keyhole, Inc, which was acquired by Google in 2004. KML became an international standard of the Open Geospatial Consortium in 2008. Google Earth was the first program able to view and graphically edit KML files. Other projects such as Marble have also started to develop KML support.

WKT - Well-known text

Well-known text (WKT) is a text markup language for representing vector geometry objects on a map, spatial reference systems of spatial objects and transformations between spatial reference systems. A binary equivalent, known as well-known binary (WKB) is used to transfer and store the same information on databases, such as PostGIS, Microsoft SQL Server and DB2. The formats were originally defined by the Open Geospatial Consortium (OGC) and described in their Simple Feature Access and Coordinate Transformation Service specifications.

Artifact (software development)

An artifact is one of many kinds of tangible by-product produced during the development of software. Some artifacts (e.g., use cases, class diagrams, and other UML models, requirements and design documents) help describe the function, architecture, and design of software. Other artifacts are concerned with the process of development itself—such as project plans, business cases, and risk assessments.

In end-user development an artifact is either an application or a complex data object that is created by an end-user without the need to know a general programming language. Artifacts describe automated behavior or control sequences, such as database requests or grammar rules, or user-generated content.

They’re usaully referring to something you create, usually as a side effect, to help you accomplish something. Perhaps a diagram, a design document,a GUI prototype, http://en.wikipedia.org/wiki/Artifact_(software_development) has more insight.

(感觉这个解释就挺清楚。Artifact 是一些辅助自己开发的工具。)

(Note, In many software tools, an artifact have a much more narrow meaning, meaning a file/library/executable that’s produced when you build/compile something)

Canonical

fickle

jQuery

jQuery is a cross-platform JavaScript library designed to simplify the client-side scripting of HTML. It was released in January 2006 at BarCamp NYC by John Resig. It is currently developed by a team of developers led by Dave Methvin. Used by over 80% of the 10,000 most visited websites, jQuery is the most popular JavaScript library in use today.

（感觉自己弄这个博客的时候居然没用 jQuery，既牛逼，又错过了学习它的机会。用了，我必须得说，大赞！）

AJAX

Ajax (also AJAX; /ˈeɪdʒæks/; an acronym for Asynchronous JavaScript and XML) is a group of interrelated web development techniques used on the client-side to create asynchronous web applications. With Ajax, web applications can send data to, and retrieve data from, a server asynchronously (in the background) without interfering with the display and behavior of the existing page. Data can be retrieved using the XMLHttpRequest object. Despite the name, the use of XML is not required (JSON is often used instead. See AJAJ), and the requests do not need to be asynchronous.

JSON

JSON (/ˈdʒeɪsɒn/ jay-soun, /ˈdʒeɪsən/ jay-son), or JavaScript Object Notation, is an open standard format that uses human-readable text to transmit data objects consisting of attribute–value pairs. It is used primarily to transmit data between a server and web application, as an alternative to XML.

Although originally derived from the JavaScript scripting language, JSON is a language-independent data format, and code for parsing and generating JSON data is readily available in a large variety of programming languages.

diacritical

TIY

mandatory

DOM - Document Object Model

The Document Object Model (DOM) is a cross-platform and language-independent convention for representing and interacting with objects in HTML, XHTML and XML documents. Objects in the DOM tree may be addressed and manipulated by using methods on the objects. The public interface of a DOM is specified in its application programming interface (API). The history of the Document Object Model is intertwined with the history of the “browser wars” of the late 1990s between Netscape Navigator and Microsoft Internet Explorer, as well as with that of JavaScript and JScript, the first scripting languages to be widely implemented in the layout engines of web browsers.

（这个音发“道穆”，我以前老以为是“杜穆”……）

MIME -Multipurpose Internet Mail Extensions

MIME is an Internet standard that extends the format of email to support:

Text in character sets other than ASCII

Non-text attachments

Message bodies with multiple parts

Header information in non-ASCII character sets

Although MIME was designed mainly for SMTP protocol, its use today has grown beyond describing the content of email and now often includes describe content type in general, including for the web (see Internet media type) and as a storage for rich content in some commercial products

The content types defined by MIME standards are also of importance outside of email, such as in communication protocols like HTTP for the World Wide Web. HTTP requires that data be transmitted in the context of email-like messages, although the data most often is not actually email.

Ogg

Ogg is a free, open container format maintained by the Xiph.Org Foundation. The creators of the Ogg format state that it is unrestricted by software patents and is designed to provide for efficient streaming and manipulation of high quality digital multimedia.

“Ogg” is derived from “ogging”, jargon from the computer game Netrek, which came to mean doing something forcefully, possibly without consideration of the drain on future resources.

The Ogg container format can multiplex a number of independent streams for audio, video, text (such as subtitles), and metadata.

Groove

wrap

NaN - Not A Number

In computing, NaN, standing for not a number, is a numeric data type value representing an undefined or unrepresentable value, especially in floating-point calculations. Systematic use of NaNs was introduced by the IEEE 754 floating-point standard in 1985, along with the representation of other non-finite quantities like infinities.

Two separate kinds of NaNs are provided, termed quiet NaNs and signaling NaNs. Quiet NaNs are used to propagate errors resulting from invalid operations or values, whereas signaling NaNs can support advanced features such as mixing numerical and symbolic computation or other extensions to basic floating-point arithmetic. For example, 0/0 is undefined as a real number, and so represented by NaN; the square root of a negative number is imaginary, and thus not representable as a real floating-point number, and so is represented by NaN; and NaNs may be used to represent missing values in computations

功率放大器简称功放

Power Amplifier

An audio power amplifier is an electronic amplifier that amplifies low-power audio signals (signals composed primarily of frequencies between 20 - 20 000 Hz, the human range of hearing) to a level suitable for driving loudspeakers and is the final stage in a typical audio playback chain.

OTS - Over-The-Shoulder Shot

over the shoulder shot

In film or video, an over the shoulder shot (also over shoulder, OS, OTS, or third-person shot) is a shot of someone or something taken from the perspective or camera angle from the shoulder of another person. The back of the shoulder and head of this person is used to frame the image of whatever (or whomever) the camera is pointing toward. This type of shot is very common when two characters are having a discussion and will usually follow an establishing shot which helps the audience place the characters in their setting. It is an example of a camera angle.

（我就说我比小璇璇知识丰富多了～）

Cranberry

Cranberries are a group of evergreen dwarf shrubs or trailing vines in the subgenus Oxycoccus of the genus Vaccinium. In some methods of classification, Oxycoccus( 酸果蔓属) is regarded as a genus in its own right. They can be found in acidic bogs(沼泽) throughout the cooler regions of the northern hemisphere.

feat.

Just featuring. This is used when there is an invited artist on a track.

It is not restricted to music. It was used on film and show billboards. You could also translate this (depending on context, select as many options as appropriate) by with the (exceptional/gracefully acknowledged/reciprocated/just-passing-by/I-just-so-love-this-guy/requested-by-the-management/i-lost-a-stupid-bet/this-is-my-brother-in-law) participation of to use a latin-derived word.

（这个在唱片里很多，feat. edition，常见的还有 “acoustic”, live, remix）

Bog

bog

A bog is a mire that accumulates peat, a deposit of dead plant material—often mosses, and in a majority of cases, sphagnum moss. It is one of the four main types of wetlands. Other names for bogs include mire, quagmire and muskeg; alkaline(碱性的) mires are called fens. They are frequently covered in ericaceous shrubs rooted in the sphagnum moss and peat. The gradual accumulation of decayed plant material in a bog functions as a carbon sink.

Bogs occur where the water at the ground surface is acidic and low in nutrients. In some cases, the water is derived entirely from precipitation(沉淀), in which case they are termed ombrotrophic (rain-fed). Water flowing out of bogs has a characteristic brown colour, which comes from dissolved peat tannins. In general the low fertility and cool climate results in relatively slow plant growth, but decay is even slower owing to the saturated soil. Hence peat accumulates. Large areas of landscape can be covered many metres deep in peat. Bogs have distinctive assemblages of plant and animal species and are of high importance for biodiversity, particularly in landscapes that are otherwise settled and farmed.

NAS - Network-Attached Storage

Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often manufactured as a computer appliance – a specialized computer built from the ground up for storing and serving files – rather than simply a general purpose computer being used for the role.

LSB - Linux Standard Base

The Linux Standard Base (LSB) is a joint project by several Linux distributions under the organizational structure of the Linux Foundation to standardize the software system structure, including the filesystem hierarchy used in the GNU/Linux operating system. The LSB is based on the POSIX specification, the Single UNIX Specification, and several other open standards, but extends them in certain areas.

Wake on LAN

Wake-on-LAN (WOL) is an Ethernet computer networking standard that allows a computer to be turned on or awakened by a network message.

The message is usually sent by a program executed on another computer on the same local area network. It is also possible to initiate the message from another network by using subnet directed broadcasts or a WOL gateway service. Equivalent terms include wake on WAN, remote wake-up, power on by LAN, power up by LAN, resume by LAN, resume on LAN and wake up on LAN. In case the computer being awakened is communicating via Wi-Fi, a supplementary standard called Wake on Wireless LAN (WoWLAN) must be employed.

DMI - Desktop Management Interface

The Desktop Management Interface (DMI) generates a standard framework for managing and tracking components in a desktop, notebook or server computer, by abstracting these components from the software that manages them. The development of DMI marked the first move by the Distributed Management Task Force (DMTF) into desktop-management standards. Before the introduction of DMI, no standardized source of information could provide details about components in a personal computer.

DMI exposes system data (including the System Management BIOS (SMBIOS) data) to management software, but the two specifications function independently.

DMI is commonly confused with SMBIOS, which was actually called DMIBIOS in its first revisions.

Semaphore (programming)

In computer science, particularly in operating systems, a semaphore is a variable or abstract data type that is used for controlling access, by multiple processes, to a common resource in a parallel programming or a multi user environment.

A useful way to think of a semaphore is as a record of how many units of a particular resource are available, coupled with operations to safely (i.e., without race conditions) adjust that record as units are required or become free, and, if necessary, wait until a unit of the resource becomes available. Semaphores are a useful tool in the prevention of race conditions; however, their use is by no means a guarantee that a program is free from these problems. Semaphores which allow an arbitrary resource count are called counting semaphores, while semaphores which are restricted to the values 0 and 1 (or locked/unlocked, unavailable/available) are called binary semaphores.

RandR

The X Resize, Rotate and Reflect Extension (RandR) is an X Window System extension, which allows clients to dynamically change X screens, so as to resize, rotate and reflect the root window of a screen. The initial X11 design did not anticipate the need for dynamic resizing and it was necessary to restart the X display server to bring about the changes. However, XFree86 has, since its first release, supported changing the screen resolution on the fly without changing the desktop size. RandR extension framework brought the ability to change display characteristics without restarting the X session. The extension framework allows laptops and handheld computers to change their screen size to drive external monitors at different resolutions than their built in screens

Word List 02

Meme

A meme (/ˈmiːm/ meem) is “an idea, behavior, or style that spreads from person to person within a culture.” A meme acts as a unit for carrying cultural ideas, symbols, or practices that can be transmitted from one mind to another through writing, speech, gestures, rituals, or other imitable phenomena with a mimicked theme. Supporters of the concept regard memes as cultural analogues（类似物） to genes in that they self-replicate, mutate, and respond to selective pressures.

The gene has its cultural analog, too: the meme. In cultural evolution, a meme is a replicator and propagator—an idea, a fashion, a chain letter, or a conspiracy(共谋) theory. On a bad day, a meme is a virus.

（你不能说 meme 是流言蜚语，因为它是中性词。它更像是地方特色、风俗，roman’s way of living。有道上的翻译是“文化基因”，很好。）

TMI - Too Much Information

plasma

plasma

Plasma (from Greek πλάσμα, “anything formed”) is one of the four fundamental states of matter (the others being solid, liquid, and gas). It comprises the major component of the Sun. Heating a gas may ionize its molecules or atoms (reducing or increasing the number of electrons in them), thus turning it into a plasma, which contains charged particles: positive ions and negative electrons or ions. Ionization[,aɪənɪ'zeʃən] can be induced by other means, such as strong electromagnetic field applied with a laser or microwave generator, and is accompanied by the dissociation of molecular bonds, if present. Plasma can also be created by the application of an electric field on a gas, where the underlying process is the Townsend avalanche.

animistic

animistic

adj. 精灵论的；万物有灵论的

总让我想到《万物有灵且有美》。

sic

The Latin adverbsic (“thus”; in full: sic erat scriptum, “thus was it written”) added immediately after a quoted word or phrase (or a longer piece of text), indicates that the quotation has been transcribed exactly as found in the original source, complete with any erroneous or archaic spelling or other nonstandard presentation.

The notation’s usual purpose is to inform the reader that any errors or apparent errors in the transcribed material do not arise from errors in the course of the transcription, and the errors have been repeated intentionally, i.e., that they are reproduced exactly as set down by the original writer or printer.

It may also be used as a form of ridicule or as a humorous comment, drawing attention to the original writer’s spelling mistakes or emphasizing his or her erroneous logic. Sic is generally placed inside square brackets “[ ]”, and traditionally in italics, as is customary when printing a foreign word. It is sometimes placed in parentheses “( )” instead, though this is less than optimal, as brackets are meant to signify that something was added to a quote.

FYI - For Your Information

FYI is a common abbreviation of “For Your Information” (or interest, in some interpretations).

“FYI” is commonly used in e-mail, instant messaging or memo messages, typically in the message subject, to flag the message as an informational message, with the intent to communicate to the receiver that he/she may be interested in the topic, but is not required to perform any action. It is also commonly used in informal and business spoken conversations.

Among Internet Standards, FYIs are a subset of the Request for Comments (RFC) series.

The following description is taken from FYI, the FYI on FYI:

The FYI series of notes is designed to provide Internet users with a central repository of information about any topics which relate to the Internet. FYIs topics may range from historical memos on “Why it was done this way” to answers to commonly asked operational questions.

Long tail

In statistics, a long tail of some distributions of numbers is the portion of the distribution having a large number of occurrences far from the “head” or central part of the distribution. The distribution could involve popularities, random numbers of occurrences of events with various probabilities, etc. A probability distribution is said to have a long tail, if a larger share of population rests within its tail than would under a normal distribution. A long-tail distribution will arise with the inclusion of many values unusually far from the mean, which increase the magnitude of the skewness(n. 歪斜) of the distribution. A long-tailed distribution is a particular type of heavy-tailed distribution.

Tic-tac-toe

Tic-tac-toe (or Noughts and crosses, Xs and Os) is a paper-and-pencil game for two players, X and O, who take turns marking the spaces in a 3×3 grid. The player who succeeds in placing three respective marks in a horizontal, vertical, or diagonal row wins the game.

这游戏家喻户晓（除了中国），但实际上很无聊。明显是大人欺负小孩子的游戏。

Wacom Digitizer

Grigori Rasputin

Grigori Rasputin

Rasputin was a healer, a man of God and an equal rights activist. For nearly a century, Grigory Rasputin, spiritual advisor to Russia’s last Tsar and Tsarina, has been unjustly maligned ([mə'laɪn], 污蔑) simply because history is written by the politically…

长得有点个性。

Han Solo

Han Solo is a character in the original trilogy of the Star Wars universe. He is portrayed by Harrison Ford. He and his co-pilot, Chewbacca, become involved in the Rebel Alliance against the Galactic Empire. Over the course of the Star Wars franchise, he becomes a chief figure in the Alliance and succeeding galactic governments. Star Wars creator George Lucas described the character as “a loner who realizes the importance of being part of a group and helping for the common good.”

Cassandra

Cassandra

[kə'sændrə]

In Greek mythology, Cassandra (Greek Κασσάνδρα, also Κασάνδρα; ), also known as Alexandra or Kassandra, was the daughter of King Priam and Queen Hecuba of Troy. She had the power of prophecy and the curse of never being believed. A common version of her story is that Apollo gave her the power of prophecy in order to seduce(诱惑) her, but when she refused him, he gave her the curse of never being believed. In an alternate version, she fell asleep in a temple, and snakes licked (or whispered in) her ears so that she was able to hear the future. The connection between snakes and knowledge is a recurring theme in Greek mythology, though sometimes it brings an ability to understand the language of animals rather than an ability to know the future. She is a figure of both epic tradition and of tragedy.

Wheel

The term Wheel was adopted by Unix users in the 1980s, due to the movement of operating system developers and users from TENEX/TOPS-20 to Unix. Modern Unix implementations generally include a security protocol that requires a user be a member of the wheel user privileges group in order to gain superuser access to a machine by using the su command.

A person with a great deal of power or influence, especially a high-ranking person in an organization, e.g. “She’s a big wheel at IBM.”

鉴于 wheel（轮子） 还有这个意思，以后我们把“造轮子”当成“造神”的双关语。

Hymn

Hymn

A hymn/him/ is a type of song, usually religious, specifically written for the purpose of praise, adoration or prayer, and typically addressed to a deity(神) or deities, or to a prominent figure or personification. The word hymn derives from Greek ὕμνος (hymnos), which means “a song of praise”. Collections of hymns are known as hymnals or hymn books.

omnivore

An omnivore/ˈomnɪvɔər/, meaning ‘all-eater’ (Latin, omnes, omnia, meaning “all” or “everything” and vorare meaning “to devour”), is an animal that can derive its energy and nutrients from a diet consisting of a variety of food sources that may include plants, animals, algae and fungi.

Omnivores often are opportunistic, general feeders which lack carnivore or herbivore specializations for acquiring or processing food, but which nevertheless consume both animal protein and vegetation.

RMS 说自己是个什么都吃的人，用的就是 omnivore 这个词。

Words List 03

Red tape

red tape

Red tape is an idiom that refers to excessive regulation or rigid conformity to formal rules that is considered redundant or bureaucratic and hinders or prevents action or decision-making. It is usually applied to governments, corporations, and other large organizations.

One definition is the “collection or sequence of forms and procedures required to gain bureaucratic approval for something, especially when oppressively complex and time-consuming”. Another definition is the “bureaucratic practice of hair splitting or foot dragging, blamed by its practitioners on the system that forces them to follow prescribed procedures to the letter”.

Predicate (grammar)

There are two competing notions of the predicate in theories of grammar. The first concerns traditional grammar, which tends to view a predicate as one of two main parts of a sentence, the other part being the subject; the purpose of the predicate is to modify the subject. The second derives from work in predicate calculus (predicate logic, first order logic) and is prominent in modern theories of syntax and grammar. In this approach, the predicate of a sentence corresponds mainly to the main verb and any auxiliaries that accompany the main verb, whereas the arguments of that predicate (e.g. the subject and object noun phrases) are outside the predicate. The competition between these two concepts has generated confusion concerning the use of the term predicate in theories of grammar.

IMO - In My Opinion

SCM - Software configuration management

In software engineering, software configuration management (SCM) is the task of tracking and controlling changes in the software, part of the larger cross-discipline field of configuration management. SCM practices include revision control and the establishment of baselines. If something goes wrong, SCM can determine what was changed and who changed it. If a configuration is working well, SCM can determine how to replicate it across many hosts.

The acronym “SCM” is also expanded as source configuration management and software change and configuration management. However, “configuration” is generally understood to cover changes typically made by a system administrator; management of source code undergoing software development is considered separately (see revision control).

记住，SVN、Git、Bazzar、Mercurial 这些都算 SCM。

Editor war

Editor war is the common name for the rivalry between users of the Vi (Vim) and Emacs text editors. The rivalry has become a lasting part of hacker culture and the free software community.

Many flame wars have been fought between groups insisting that their editor of choice is the paragonof editing perfection, and insulting the others. Unlike the related battles over operating systems, programming languages, and even source code indent style, choice of editor usually only affects oneself.

name suffix

A name suffix, in the Western English-language naming tradition, follows a person’s full name and provides additional information about the person. Post-nominal letters indicate that the individual holds a position, educational degree, accreditation, office, or honor.

post nominal letters

Post-nominal letters, also called post-nominal initials, post-nominal titles, or designatory letters, are letters placed after the name of a person to indicate that the individual holds a position, educational degree, accreditation, office, military decoration, or honour, or is a member of a religious institute. An individual may use several different sets of post-nominal letters, but in some regions it may be customary to limit the number of sets to one or just a few. The order in which these are listed after a name is based on the order of precedence and category of the order. Post-nominal letters are one of the main types of name suffix.

De-facto

De facto (/dɨ ˈfæktoʊ/, /deɪ-/, Latin: [deː ˈfaktoː]) is a Latin expression that means “concerning fact”. In law, it often means “in practice but not necessarily ordained by law” or “in practice or actuality, but not officially established”. It is commonly used in contrast to de jure (which means “concerning the law”) when referring to matters of law, governance, or technique (such as standards) that are found in the common experience as created or developed without or contrary to a regulation. When discussing a legal situation, de jure designates what the law says, while de facto designates action of what happens in practice. It is analogous and similar to the expressions “for all intents and purposes” or “in fact”.

这个词很常见。（是“实际中的主流”的意思？感觉和一个词弄混了。）

Quotation mark glyphs

Different typefaces, character encodings and computer languages use various encodings and glyphs for quotation marks. This article lists some of these glyphs along with their Unicode code points and HTML entities.

DWIM - Do What I Mean

DWIM (“Do What I Mean”) computer systems attempt to anticipate what users intend to do, correcting trivial errors automatically rather than blindly executing users’ explicit but incorrect input. The term was coined by Warren Teitelman in his DWIM package for BBN Lisp, part of his PILOT system, some time before 1966.

Teitelman and his Xerox PARC colleague Larry Masinter later described the philosophy of DWIM in the Interlisp programming environment (the successor of BBN Lisp):

Although most users think of DWIM as a single identifiable package, it embodies a pervasive philosophy of user interface design: at the user interface level, system facilities should make reasonable interpretations when given unrecognized input. …the style of interface used throughout Interlisp allows the user to omit various parameters and have these default to reasonable values…

DWIM is an embodiment of the idea that the user is interacting with an agent who attempts to interpret the user’s request from contextual information. Since we want the user to feel that he is conversing with the system, he should not be stopped and forced to correct himself or give additional information in situations where the correction or information is obvious.

Critics of DWIM claimed that it was “tuned to the particular typing mistakes to which Teitelman was prone, and no others” and called it “Do What Teitelman Means” or “Do What Interlisp Means.”

Modus operandi

Modus operandi (plural modi operandi) is a Latin phrase, approximately translated as “method of operation”. The term is used to describe someone’s habits of working, particularly in the context of business or criminal investigations. In English, it is often shortened to M.O.

The expression is often used in police work when discussing a crime and addressing the methods employed by the perpetrators. It is also used in criminal profiling, where it can help in finding clues to the offender’s psychology. It largely consists of examining the actions used by the individual(s) to execute the crime, prevent its detection and/or facilitate escape. A suspect’s modus operandi can assist in his identification, apprehension, or repression, and can also be used to determine links between crimes.

Words List 04

QWAN - Quality without a Name

For Christopher Alexander, it is most important to think about the people who will come in contact with a piece of architecture. One of his key values is making these people feel more alive. He talks about the “quality without a name” (QWAN).

More generally, we could say that a good system should be accepted, welcomed and happily embraced as an enrichment of daily life by those who are meant to use it, or - even better - by all people it affects. For instance, when discussing a street café, Alexander discusses the possible desires of a guest, but also mentions people who just walk by.

The same thinking can be applied to technical devices such as telephones and cars, to social structures like a team working on a project, or to the user interface of a computer program. The qualities of a software system, for instance, could be rated by observing whether users spend their time enjoying or struggling with the system.

Another possible value is the efficiency of a system, regarding a specific task. Here the happiness of the participants is less important, as long as they do their job. In software engineering, design patterns usually help to create object-oriented code that is easy to read, maintain, modify and reuse. By focusing on the impacts on human life, we can identify patterns that are independent from changing technology, and thus find “timeless quality”.

这玩意儿也没中文翻译，突然想到，是不是可以说成是“无印良品”。

Narcissus

Narcissus

In Greek mythology, Narcissus (/nɑrˈsɪsəs/; Greek: Νάρκισσος, Narkissos) was a hunter from the territory of Thespiae in Boeotia who was renowned for his beauty. He was the son of a river god named Cephissus and a nymph named Liriope. He was exceptionally proud of what he did to those who loved him. Nemesis noticed and attracted Narcissus to a pool, wherein he saw his reflection and fell in love with it, not realizing it was merely an image. Unable to leave the beauty of his reflection, Narcissus died. Narcissus is the origin of the term narcissism, a fixation with oneself.

Comic Sans

Comic Sans MS, commonly referred to as Comic Sans, is a sans-serif casual script typeface designed by Vincent Connare and released in 1994 by Microsoft Corporation. It is a casual, non-connecting script inspired by comic book lettering, intended for use in informal documents and educational materials.

The typeface has been supplied with Microsoft Windows since the introduction of Windows 95, initially as a supplemental font in the Windows Plus Pack and later in Microsoft Comic Chat. Describing it, Microsoft has explained that “this casual but legible face has proved very popular with a wide variety of people.”

The typeface’s widespread use, often in situations for which it was not intended, has been criticized.

Emoji

Emoji (絵文字 or えもじ; Japanese pronunciation: [emodʑi]) are the ideograms or smileys used in Japanese electronic messages and webpages, whose use is spreading outside Japan. Originally meaning pictograph, the word emoji literally means “picture” (e) + “character” (moji). The characters are used much like ASCII emoticons or kaomoji, but a wider range is provided, and the icons are standardized and built into the handsets.

Although originally only available in Japan, some emoji character sets have been incorporated into Unicode, allowing them to be used elsewhere as well. As a result, some phones such as the Windows Phone and the iPhone lines allow access to the symbols without requiring a Japanese carrier. Emoji have also started appearing in emailing services such as Gmail

Here document

In computer science, a here document (here-document, heredoc, hereis, here-string or here-script) is a file literal or input stream literal: it is a section of a source code file that is treated as if it were a separate file. The term is also used for a form of multiline string literals that use similar syntax, preserving line breaks and other whitespace (including indentation) in the text.

Here documents originate in the Unix shell, and are found in sh, csh, ksh, Bash and zsh, among others. Here document-style string literals are found in various high-level languages, notably the Perl programming language (syntax inspired by Unix shell) and languages influenced by Perl, such as PHP and Ruby. Other high-level languages such as Python and Tcl have other facilities for multiline strings.

The most common syntax for here documents, originating in Unix shells, is << followed by a delimiting identifier, followed, starting on the next line, by the text to be quoted, and then closed by the same identifier on its own line.

panchromatic

Truth or Dare? 真心话大冒险

Truth or Dare? is a party game requiring at least three players. Players are given the choice between answering a question truthfully, or performing a “dare”, both of which are set by the other players. The game is particularly popular among adolescents and children, and is sometimes used as a forfeit when gambling.

The game has existed for centuries, with at least one variant, Questions and Commands, being attested as early as 1712.

在鸟人里也看到了这个词。

Intrusive Thoughts

Intrusive thoughts are unwelcome involuntary thoughts, images, or unpleasant ideas that may become obsessions, are upsetting or distressing, and can be difficult to manage or eliminate. When they are associated with obsessive-compulsive disorder (OCD), depression, body dysmorphic disorder (BDD), and sometimes attention-deficit hyperactivity disorder (ADHD), the thoughts may become paralyzing, anxiety-provoking, or persistent. Intrusive thoughts may also be associated with episodic memory, unwanted worries or memories from OCD, posttraumatic stress disorder, other anxiety disorders, eating disorders, or psychosis. Intrusive thoughts, urges, and images are of inappropriate things at inappropriate times, and they can be divided into three categories: “inappropriate aggressive thoughts, inappropriate sexual thoughts, or blasphemous religious thoughts”.

我也有个很 horrible 的 intrusive thoughts。

Saint Sebastian

Saint Sebastian (died c. 288) was an early Christian saint and martyr. It is said that he was killed during the Roman emperor Diocletian’s persecution of Christians. He is commonly depicted in art and literature tied to a post or tree and shot with arrows. This is the most common artistic depiction of Sebastian; however, according to legend, he was rescued and healed by Irene of Rome. Shortly afterwards he criticized Diocletian in person and as a result was clubbed to death. He is venerated in the Catholic and Orthodox Churches.

The details of Saint Sebastian’s martyrdom were first spoken of by 4th-century bishop Ambrose of Milan (Saint Ambrose), in his sermon (number 22) on Psalm 118. Ambrose stated that Sebastian came from Milan and that he was already venerated there at that time. Saint Sebastian is a popular male saint, especially among soldiers.

OGC (符号)

G.I. - Government Issue

G.I. is a noun used to describe the soldiers of the U.S. Army and airmen of the U.S. Army Air Forces — and occasionally for U.S. Marines and shorebound sailors — and also for general items of their equipment.

The term G.I. has been used for a long time as an initialism of “Government Issue” or “General Issue”, but it originally referred to “galvanized iron”, as used by the logistics services of the Armed Forces of the United States.

The letters “G.I.” were used to denote equipment made from galvanized iron, such as metal trash cans, in U.S. Army inventories and supply records.

Krypton

Krypton (from Greek: κρυπτός kryptos “the hidden one”) is a chemical element with symbol Kr and atomic number 36. It is a member of group 18 (noble gases) elements. A colorless, odorless, tasteless noble gas, krypton occurs in trace amounts in the atmosphere, is isolated by fractionally distilling liquefied air, and is often used with other rare gases in fluorescent lamps. Krypton is inert for most practical purposes.

Krypton (comics)

Krypton is a fictional planet in the DC Universe and the native world of Superman. In some stories, it is also the native world of Supergirl, Krypto the Superdog, and Power Girl (albeit an alternate universe version in her case, designated “Krypton-Two”). Krypton has been portrayed consistently as having been destroyed just after Superman’s flight from the planet, with exact details of its destruction varying by time period, writers and franchise. Kryptonians were the dominant species on Krypton.

The planet was created by Jerry Siegel and Joe Shuster, and was first referred to in Action Comics #1 (June 1938). The planet was given its first full-fledged appearance in Superman #1 (Summer 1939).

BNF - Backus Normal Form

In computer science, BNF (Backus Normal Form or Backus–Naur Form) is one of the two main notation techniques for context-free grammars, often used to describe the syntax of languages used in computing, such as computer programming languages, document formats, instruction sets and communication protocols; the other main technique for writing context-free grammars is the van Wijngaarden form. They are applied wherever exact descriptions of languages are needed: for instance, in official language specifications, in manuals, and in textbooks on programming language theory.

Many extensions and variants of the original Backus–Naur notation are used; some are exactly defined, including Extended Backus–Naur Form (EBNF) and Augmented Backus–Naur Form (ABNF).

Extended Backus–Naur Form

BNF notations

EBNF is a code that expresses the grammar of a formal language. An EBNF consists of terminal symbols and non-terminal production rules which are the restrictions governing how terminal symbols can be combined into a legal sequence. Examples of terminal symbols include alphanumeric characters, punctuation marks, and white space characters.

The EBNF defines production rules where sequences of symbols are respectively assigned to a nonterminal:

Definite clause grammar

A definite clause grammar (DCG) is a way of expressing grammar, either for natural or formal languages, in a logic programming language such as Prolog. It is closely related to the concept of attribute grammars / affix grammars from which Prolog was originally developed. DCGs are usually associated with Prolog, but similar languages such as Mercury also include DCGs. They are called definite clause grammars because they represent a grammar as a set of definite clauses in first-order logic.

A basic example of DCGs helps to illustrate what they are and what they look like.

Pseudocode

Pseudocode is an informal high-level description of the operating principle of a computer program or other algorithm.

It uses the structural conventions of a programming language, but is intended for human reading rather than machine reading. Pseudocode typically omits details that are not essential for human understanding of the algorithm, such as variable declarations, system-specific code and some subroutines. The programming language is augmented with natural language description details, where convenient, or with compact mathematical notation. The purpose of using pseudocode is that it is easier for people to understand than conventional programming language code, and that it is an efficient and environment-independent description of the key principles of an algorithm. It is commonly used in textbooks and scientific publications that are documenting various algorithms, and also in planning of computer program development, for sketching out the structure of the program before the actual coding takes place.

No standard for pseudocode syntax exists, as a program in pseudocode is not an executable program. Pseudocode resembles, but should not be confused with skeleton programs, including dummy code, which can be compiled without errors. Flowcharts and Unified Modeling Language (UML) charts can be thought of as a graphical alternative to pseudocode, but are more spacious on paper.

Over-the-top content

Over-the-top content (OTT) refers to delivery of video, audio and other media over the Internet without a multiple system operator being involved in the control or distribution of the content. The provider may be aware of the contents of the Internet Protocol packets but is not responsible for, nor able to control, the viewing abilities, copyrights, and/or other redistribution of the content. This is in contrast to purchase or rental of video or audio content from an Internet service provider (ISP), such as pay television video on demand or an IPTV video service, like AT&T U-Verse. OTT in particular refers to content that arrives from a third party, such as NowTV, Netflix, WhereverTV, NetD, Hulu, Crackle, WWE Network, RPI TV or myTV, and is delivered to an end user device, leaving the ISP responsible only for transporting IP packets.

Literate programming

Literate programming is an approach to programming introduced by Donald Knuth in which a program is given as an explanation of the program logic in a natural language, such as English, interspersed with snippets of macros and traditional source code, from which a compilable source code can be generated.

The literate programming paradigm, as conceived by Knuth, represents a move away from writing programs in the manner and order imposed by the computer, and instead enables programmers to develop programs in the order demanded by the logic and flow of their thoughts. Literate programs are written as an uninterrupted exposition of logic in an ordinary human language, much like the text of an essay, in which macros are included to hide abstractions and traditional source code.

Literate programming tools are used to obtain two representations from a literate source file: one suitable for further compilation or execution by a computer, the “tangled” code, and another for viewing as formatted documentation, which is said to be “woven” from the literate source. While the first generation of literate programming tools were computer language-specific, the later ones are language-agnostic and exist above the programming languages.

WTFPL

The WTFPL (Do What the Fuck You Want to Public License) is a permissive way of licensing intellectual property rights, most commonly used as a permissive free software license. It is essentially no different from dedication to the public domain. The original Version 1.0 license, released March 2000, was written by Banlu Kemiyatorn who used it for Window Maker artwork. Sam Hocevar, a French programmer who was the Debian project leader from 17 April 2007 to 16 April 2008, wrote version 2.0. It allows for redistribution and modification of the software under any terms – licensees are encouraged to “do what the fuck [they] want to”. The license was approved as a GPL-compatible free software license by the Free Software Foundation.

比 MIT 还大度的样子……

弥赛亚

Chinese language

Chinese (汉语 / 漢語; Hànyǔ or 中文; Zhōngwén) is a group of related but in many cases mutually unintelligible language varieties, which forms one of the branches of the Sino-Tibetan language family. Chinese is spoken by the Han majority and many other ethnic groups in China. More than one billion people, or about one-fifth of the world’s population, speak some form of Chinese as their first language.

Language codes:

ISO 639-1 zh

ISO 639-2 chi (B)

zho (T)

ISO 639-3 zho – inclusive code

Individual codes:

cdo – Min Dong

cjy – Jinyu

cmn – Mandarin

cpx – Pu Xian

czh – Huizhou

czo – Min Zhong

gan – Gan

hak – Hakka

hsn – Xiang

mnp – Min Bei

nan – Min Nan

wuu – Wu

yue – Yue

och – Old Chinese

ltc – Late Middle Chinese

lzh – Classical Chinese

Glottolog sini1245

Linguasphere 79-AAA

Closure (computer programming)

In programming languages, a closure (also lexical closure or function closure) is a function or reference to a function together with a referencing environment—a table storing a reference to each of the non-local variables (also called free variables or upvalues) of that function. A closure—unlike a plain function pointer—allows a function to access those non-local variables even when invoked outside its immediate lexical scope.

The concept of closures was developed in the 1960s and was first fully implemented in 1975 as a language feature in the Scheme programming language to support lexically scoped first-class functions. The use of closures is associated with functional programming languages such as Lisp and ML. Traditional imperative languages such as Algol, C and Pascal do not support returning nested functions as results from higher-order functions. Many modern garbage-collected imperative languages support closures, such as Smalltalk (the first object-oriented language to do so), OCaml, Python, Perl, Ruby, JavaScript, Go, Dart, Scala, Swift, C#, Rust, Julia and C++ since C++11.

UGC - User-generated content

User-generated content (UGC) refers to a variety of media available in a range of modern communications technologies. UGC is often produced through open collaboration: it is created by goal-oriented yet loosely coordinated participants, who interact to create a product or service of economic value, which they make available to contributors and non-contributors alike.

If and only if

In logic and related fields such as mathematics and philosophy, if and only if (shortened iff) is a biconditional logical connective between statements.

In that it is biconditional, the connective can be likened to the standard material conditional (“only if”, equal to “if … then”) combined with its reverse (“if”); hence the name. The result is that the truth of either one of the connected statements requires the truth of the other, i.e., either both statements are true, or both are false. It is controversial whether the connective thus defined is properly rendered by the English “if and only if”, with its pre-existing meaning. There is nothing to stop one from stipulating that we may read this connective as “only if and if”, although this may lead to confusion.

Axiom

An axiom, or postulate, is a premise or starting point of reasoning. As classically conceived, an axiom is a premise so evident as to be accepted as true without controversy. The word comes from the Greek ἀξίωμα (āxīoma) ‘that which is thought worthy or fit’ or ‘that which commends itself as evident.’ As used in modern logic, an axiom is simply a premise or starting point for reasoning. Axioms define and delimit the realm of analysis; the relative truth of an axiom is taken for granted within the particular domain of analysis, and serves as a starting point for deducing and inferring other relative truths. No explicit view regarding the absolute truth of axioms is ever taken in the context of modern mathematics, as such a thing is considered to be an irrelevant and impossible contradiction in terms.

Per se

Without referring to anything else, intrinsically, taken without qualifications etc. A common example is negligence per se. See also malum in se.

Moore method

The Moore method is a deductive manner of instruction used in advanced mathematics courses. It is named after Robert Lee Moore, a famous topologist who first used a stronger version of the method at the University of Pennsylvania when he began teaching there in 1911.

The way the course is conducted varies from instructor to instructor, but the content of the course is usually presented in whole or in part by the students themselves. Instead of using a textbook, the students are given a list of definitions and theorems which they are to prove and present in class, leading them through the subject material. The Moore method typically limits the amount of material that a class is able to cover, but its advocates claim that it induces a depth of understanding that listening to lectures cannot give.

e.g. & i.e.

exempli gratia (e.g.), usually shortened in English to “for example” (see citation signal). Often confused with id est (i.e.).

Exempli gratia (e.g.) and id est (i.e.) are commonly confused and misused in colloquial English. The former, exempli gratia, means “for example”, and is used before giving examples of something (“I have lots of favorite colors, e.g., blue, green, and hot pink”). The latter, id est, means “that is”, and is used before clarifying the meaning of something, when elaborating, specifying, or explaining rather than when giving examples (“I have lots of favorite colors; i.e., I can’t decide on just one”). In British style, the stops may be omitted: “I have lots of favourite colours, eg blue, green and hot pink”. “I have lots of favourite colours; ie I can’t decide on just one”

Abuse of notation

In mathematics, abuse of notation occurs when an author uses a mathematical notation in a way that is not formally correct but that seems likely to simplify the exposition or suggest the correct intuition (while being unlikely to introduce errors or cause confusion). Abuse of notation should be contrasted with misuse of notation, which should be avoided.

A related concept is abuse of language or abuse of terminology, when not notation but a term is misused. Abuse of language is an almost synonymous expression that is usually used for non-notational abuses. For example, while the word representation properly designates a group homomorphism from a group G to GL(V) where V is a vector space, it is common to call V “a representation of G”. A common abuse of language consists in identifying two mathematical objects that are different but canonically isomorphic. For example, identifying a constant function and its value or identifying to \(\mathbb R^3\) the Euclidean space of dimension three equipped with a Cartesian coordinate system.

The latter uses may achieve clarity in the new area in an unexpected way, but it may borrow arguments from the old area that do not carry over, creating a false analogy.

Trinitron was Sony’s brand name for its line of aperture grille based CRTs used in television sets and computer display monitors. One of the first truly new television systems to enter the market since the 1950s, the Trinitron was announced in 1968 to wide acclaim for its bright images, about 25% brighter than common shadow mask televisions of the same era. Constant improvement in the basic technology and attention to overall quality allowed Sony to charge a premium for Trinitron devices into the 1990s.

LOL

It’s original definition was “Laughing out loud” (also written occasionally as “Lots of Laughs”), used as a brief acronym to denote great amusement in chat conversations.

Now, it is overused to the point where nobody laughs out loud when they say it. In fact, they probably don’t even give a shit about what you just wrote. More accurately, the acronym “lol” should be redefined as “Lack of laughter.” （变成了讽刺，感觉有点像 “呵呵”）

Depending on the chatter, its definition may vary. The list of its meanings includes, but is not limited to:

“I have nothing worthwhile to contribute to this conversation.”

“I’m too lazy to read what you just wrote so I’m typing something useless in hopes that you’ll think I’m still paying attention.”

Statement: Sorry if I’m not too cheery, my best friend just died yesterday.

Worthless Reply: lol

Statement: The golden ratio is truely an intersting aspect of not only mathematics, but art as well.

Worthless Reply: lol

Statement: … And then he says, “Your mom goes to college!”

Worthless Reply: lol

Statement: Hey, are you doing anything tonight? You could come over to my house and play some Unreal Tournie…

Worthless Reply: lol, ok

Voice-Over

Voice-over (also known as off-camera or off-stage commentary) is a production technique where a voice—that is not part of the narrative (non-diegetic)—is used in a radio, television production, filmmaking, theatre, or other presentations. The voice-over may be spoken by someone who appears elsewhere in the production or by a specialist voice actor. It is pre-recorded and placed over the top of a film or video and commonly used in documentaries or news reports to explain information.

Conan Show

Conan is a late-night talk show airing each Monday through Thursday on TBS in the United States. The hourlong show premiered（首次公演） on November 8, 2010, and is hosted by writer, comedian and performer Conan O’Brien. The program’s host previously starred on NBC’s Late Night with Conan O’Brien for 16 years, then presented The Tonight Show for seven months until Jay Leno’s return to his version of The Tonight Show due to the 2010 Tonight Show conflict.

Kama Sutra

Ellen Show

The Ellen DeGeneres Show, often shortened to Ellen, is an American television talk show hosted by comedian/actress Ellen DeGeneres. Debuting（/de'bju/ 初次登台） on September 8, 2003, it is produced by Telepictures and airs in syndication, including stations owned by NBCUniversal, in the United States and Canada. For its first five seasons, the show was taped in Studio 11 at NBC Studios in Burbank, California. It later moved to Stage 1 on the nearby Warner Bros. lot. Since the beginning of the sixth season, Ellen has broadcast in high definition. The show has won 36 Daytime Emmy Awards as of 2013. It was announced on March 11, 2013 that the show had been renewed through 2017, which would extend the show through its 14th season.

Mark I

Mark I often refers to the first version of a weapon or military vehicle, and is sometimes used in a similar fashion in civilian product development. In some instances, the Arabic numeral “1” is substituted for the Roman numeral “I”.

“Mark”, meaning “model” or “variant”, can itself be abbreviated “Mk.”

Publish or Perish

“Publish or perish” is a phrase coined to describe the pressure in academia to rapidly and continuously publish academic work to sustain or further one’s career.

Frequent publication is one of few methods at scholars’ disposal（安排） to demonstrate academic talent. Successful publications bring attention to scholars and their sponsoring institutions, which can facilitate continued funding and an individual’s progress through their field. In popular academic perception, scholars who publish infrequently, or who focus on activities that do not result in publications, such as instructing undergraduates, may find themselves out of contention for available tenure-track positions. The pressure to publish has been cited as a cause of poor work being submitted to academic journals.

Men List 01

Yoshitomo Nara

slash with a knife

Yoshitomo Nara (奈良美智 Nara Yoshitomo, born 5 December 1959 in Hirosaki, Japan) is a Japanese artist. He lives and works in Tokyo, though his artwork has been exhibited worldwide. Nara has had nearly 40 solo exhibitions since 1984. He is represented in New York City by Pace Gallery, in Los Angeles by Blum & Poe and in London by Stephen Friedman Gallery.

Yoko Ono

Yoko Ono

Yoko Ono (オノ・ヨーコ 小野 洋子 Ono Yōko), born February 18, 1933, is a Japanese artist, singer-songwriter, and peace activist. She is the second wife and widow of John Lennon and is also known for her work in avant-garde art, music and filmmaking

Dropping out of the graduate track program in philosophy at Tokyo’s Peers School, Ono moved to New York in 1953 joining her immediate family who were already there. After some time at Sarah Lawrence College, she became involved in New York City’s downtown artists scene, collaborating and working with members in and around the Fluxus group. An independent artist in her own right before meeting Lennon, both the media and the public were critical of her for years. She was repeatedly criticized for her influence over Lennon and his music, and blamed for the breakup of the Beatles: The couple’s early years coincided with the band’s final ones. Her experimental art was also not popularly understood, and, after Lennon’s death, her disagreements with Paul McCartney received as much attention as her billboards and music releases, which the media usually advanced simply as attempts at self-promotion.

Grace Hopper

Grace Hopper

Grace Murray Hopper (December 9, 1906 – January 1, 1992) was an American computer scientist and United States Navy rear admiral. A pioneer in the field, she was one of the first programmers of the Harvard Mark I computer, and developed the first compiler for a computer programming language. She popularized the idea of machine-independent programming languages, which led to the development of COBOL, one of the first modern programming languages. She is credited with popularizing the term “debugging” for fixing computer glitches(inspired by an actual moth removed from the computer). Owing to the breadth of her accomplishments and her naval rank, she is sometimes referred to as “Amazing Grace”. The U.S. Navy destroyer USS Hopper (DDG-70) is named for her, as was the Cray XE6 “Hopper” supercomputer at NERSC.

她定义了“bug”。

The Everly Brothers

the Everly Brothers

The Everly Brothers were American country-influenced rock and roll singers, known for steel-string guitar playing and close harmony singing. The duo, consisting of Isaac Donald “Don” Everly (born February 1, 1937) and Phillip “Phil” Everly (January 19, 1939 – January 3, 2014), were elected to the Rock and Roll Hall of Fame in 1986 and the Country Music Hall of Fame in 2001.

Elvis Presley

Elvis Presley

Elvis Aaron Presley (January 8, 1935 – August 16, 1977) was an American singer, musician, and actor. Regarded as one of the most significant cultural icons of the 20th century, he is often referred to as “the King of Rock and Roll”, or simply, “the King”.

In November 1956, he made his film debut in Love Me Tender. … In 1973, Presley was featured in the first globally broadcast concert via satellite, Aloha from Hawaii. Several years of prescription drug abuse severely deteriorated his health, and he died in 1977 at the age of 42.

Presley is one of the most celebrated musicians of the 20th century. Commercially successful in many genres, including pop, blues and gospel, he is the best-selling solo artist in the history of recorded music, with estimated album sales of around 600 million units worldwide. He was nominated for 14 Grammys and won three, receiving the Grammy Lifetime Achievement Award at age 36, and has been inducted into multiple music halls of fame.

Bob Dylan

Bob Dylan

Bob Dylan (/ˈdɪlən/; born Robert Allen Zimmerman, May 24, 1941) is an American musician, singer-songwriter, artist, and writer. He has been an influential figure in popular music and culture for more than five decades. Much of his most celebrated work dates from the 1960s, when he was an informal chronicler and a seemingly reluctant figurehead of social unrest. A number of Dylan’s early songs, such as “Blowin’ in the Wind” and “The Times They Are a-Changin’”, became anthems for the US civil rights and anti-war movements. Leaving behind his initial base in the culture of the folk music revival, Dylan’s six-minute single “Like a Rolling Stone” radically altered the parameters of popular music in 1965. His recordings employing electric instruments attracted denunciation and criticism from others in the folk movement.

Men List 03

Bill Joy

William Nelson Joy (born November 8, 1954) is an American computer scientist. Joy co-founded Sun Microsystems in 1982 along with Vinod Khosla, Scott McNealy and Andreas von Bechtolsheim, and served as chief scientist at the company until 2003. He played an integral role in the early development of BSD UNIX while a graduate student at Berkeley, and he is the original author of the vi text editor. He also wrote the 2000 essay “Why the Future Doesn’t Need Us”, in which he expressed deep concerns over the development of modern technologies. Some of his most notable contributions were the ex and vi editors and csh.

段子

BBN had a big contract to implement TCP/IP, but their stuff didn’t work, and grad student Joy’s stuff worked. So they had this big meeting and this grad student in a T-shirt shows up, and they said, “How did you do this?” And Bill said, “It’s very simple — you read the protocol and write the code.”

如此的牛逼，vi 也是他写的……Sam 好像也是。

keywords: SUN, UNIX, TCP/IP, Berkeley, vi, csh,

John D. Carmack

John D. Carmack (born August 20, 1970) is an American game programmer and the co-founder of Id Software. Carmack was the lead programmer of the Id video games Commander Keen, Wolfenstein 3D, Doom, Quake, Rage and their sequels. Carmack is best known for his innovations in 3D graphics, and is also a rocketry enthusiast and the founder and lead engineer of Armadillo Aerospace. In August 2013, Carmack took the position of CTO at Oculus VR.

David Neil “Dave” Cutler, Sr

David Neil “Dave” Cutler, Sr. (born March 13, 1942) is an American software engineer, designer and developer of several operating systems including Windows NT at Microsoft and RSX-11M, VMS and VAXELN at Digital Equipment Corporation.

Cutler was also known for his disdain(蔑视) for all things Unix.

keywords: Windows NT, VMS, DEC, MS, Windows Azure, X Box

Donald Knuth

Donald Ervin Knuth (/kəˈnuːθ/kə-nooth; born January 10, 1938) is an American computer scientist, mathematician, and Professor Emeritus(名誉退休的) at Stanford University.

He is the author of the multi-volume work The Art of Computer Programming.(TAOCP). Knuth has been called the “father” of the analysis of algorithms. In addition to fundamental contributions in several branches of theoretical computer science, Knuth is the creator of the TeX computer typesetting system, the related METAFONT font definition language and rendering system, and the Computer Modern family of typefaces.

Hopper & Knuth

As a writer and scholar, Knuth created the WEB and CWEB computer programming systems designed to encourage and facilitate literate programming, and designed the MIX/MMIX instruction set architectures. As a member of the academic and scientific community, Knuth is strongly opposed to the policy of granting software patents. He has expressed his disagreement directly to both the United States Patent and Trademark Office and European Patent Organization.

Ken Thompson

Kenneth Thompson (born February 4, 1943), commonly referred to as ken in hacker circles, is an American pioneer of computer science. Having worked at Bell Labs for most of his career, Thompson designed and implemented the original Unix operating system. He also invented the B programming language, the direct predecessor to the C programming language, and was one of the creators and early developers of the Plan 9 operating systems. Since 2006, Thompson works at Google, where he co-invented the Go programming language.

Other notable contributions included his work on regular expressions and early computer text editors QED and ed, the definition of the UTF-8 encoding, his work on computer chess that included creation of endgame tablebases and the chess machine Belle.

Rob Pike

Robert Pike (born 1956) is a Canadian software engineer and author. He is best known for his work at Bell Labs, where he was a member of the Unix team and was involved in the creation of the Plan 9 from Bell Labs and Inferno operating systems, as well as the Limbo programming language.

He also co-developed the Blit graphical terminal for Unix; before that he wrote the first window system for Unix in 1981. Pike is the sole inventor named in AT&T’s US patent 4,555,775 or “backing store patent” that is part of the X graphic system protocol and one of the first software patents.

Over the years Pike has written many text editors; sam and acme are the most well known and are still in active use and development.

Pike, with Brian Kernighan, is the co-author of The Practice of Programming and The Unix Programming Environment. With Ken Thompson he is the co-creator of UTF-8. Pike also developed lesser systems such as the vismon program for displaying images of faces of email authors.

Pike is married to Renée French, and currently works for Google, where he is involved in the creation of the programming languages Go and Sawzall.

Dennis M. Richie

Dennis MacAlistair Ritchie (September 9, 1941 – c. October 12, 2011) was an American computer scientist. He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system. Ritchie and Thompson received the Turing Award from the ACM in 1983, the Hamming Medal from the IEEE in 1990 and the National Medal of Technology from President Clinton in 1999. Ritchie was the head of Lucent Technologies System Software Research Department when he retired in 2007. He was the “R” in K&R C and commonly known by his username dmr.

Ritchie was found dead on October 12, 2011, at the age of 70 at his home in Berkeley Heights, New Jersey, where he lived alone. First news of his death came from his former colleague, Rob Pike. The cause and exact time of death have not been disclosed. He had been in frail health for several years following treatment for prostate cancer and heart disease. His death came a week after the death of Steve Jobs but did not receive as much media coverage. Computer historian Paul E. Ceruzzi said after his death: “Ritchie was under the radar. His name was not a household name at all, but… if you had a microscope and could look in a computer, you’d see his work everywhere inside.”

Edsger W. Dijkstra

Edsger Wybe Dijkstra (Dutch pronunciation: [ˈɛtsxər ˈʋibə ˈdɛikstra] ( listen); 11 May 1930 – 6 August 2002) was a Dutch computer scientist. He received the 1972 Turing Award for fundamental contributions to developing programming languages, and was the Schlumberger Centennial Chair of Computer Sciences at The University of Texas at Austin from 1984 until 2000.

Shortly before his death in 2002, he received the ACM PODC Influential Paper Award in distributed computing for his work on self-stabilization of program computation. This annual award was renamed the Dijkstra Prize the following year, in his honor.

Dijkstra was known for his habit of carefully composing manuscripts with his fountain pen. The manuscripts are called EWDs, since Dijkstra numbered them with EWD, his initials, as a prefix.

Anders Hejlsberg

Anders Hejlsberg (born December 1960) is a prominent Danish software engineer who co-designed several popular and commercially successful programming languages and development tools. He was the original author of Turbo Pascal and the chief architect of Delphi. He currently works for Microsoft as the lead architect of C# and core developer on TypeScript.

All Our Patent Are Belong To You | Tesla Motors

When I started out with my first company, Zip2, I thought patents were a good thing and worked hard to obtain them. … After Zip2, when I realized that receiving a patent really just meant that you bought a lottery ticket to a lawsuit, I avoided them whenever possible.

The unfortunate reality is the opposite: electric car programs (or programs for any vehicle that doesn’t burn hydrocarbons) at the major manufacturers are small to non-existent, constituting an average of far less than 1% of their total vehicle sales.

Technology leadership is not defined by patents, which history has repeatedly shown to be small protection indeed against a determined competitor, but rather by the ability of a company to attract and motivate the world’s most talented engineers. We believe that applying the open source philosophy to our patents will strengthen rather than diminish Tesla’s position in this regard.

芙蓉姐姐

Math List 01

Variable (mathematics)

In elementary mathematics, a variable is an alphabetic character representing a number which is either arbitrary or not fully specified or unknown. Making algebraic computations with variables as if they were explicit numbers allows one to solve a range of problems in a single computation. A typical example is the quadratic formula（二项式）, which allows to solve every quadratic equation by simply substituting the numeric values of the coefficients of the given equation to the variables that represent them.

The concept of variable is also fundamental in calculus. Typically, a function y = f(x) involves two variables, its argument x and its value y. The term “variable” comes from the fact that, when the argument (also called the “variable of the function”) varies, then the value varies accordingly.

In more advanced mathematics, a variable is simply a symbol representing some data, which is commonly a number, but may also be any mathematical object such as a vector, a matrix or even a function. In this case, the original property of “variability” of a variable is not kept (except, sometimes, for informal explanations).

Similarly, in computer science, a variable is a name (commonly an alphabetic character or a word) representing some value represented in computer memory. In mathematical logic, a variable is either a symbol representing an unspecified term of the theory, or a basic object of the theory, which is manipulated without referring to its possible intuitive interpretation.

Here are other specific names for variables.

A unknown is a variable in which an equation has to be solved for.

An indeterminate (like ) is a symbol, commonly called variable, that appears in a polynomial or a formal power series. Formally speaking, an indeterminate is not a variable, but a constant in the polynomial ring of the ring of formal power series. However, because of the strong relationship between polynomials or power series and the functions that they define, many authors consider indeterminates as a special kind of variables.

A parameter is a quantity (usually a number) which is a part of the input of a problem, and remains constant during the whole solution of this problem. For example, in mechanics the mass and the size of a solid body are parameters for the study of its movement. It should be noted that in computer science, parameter has a different meaning and denotes an argument of a function.

Free variables and bound variables

A random variable is a kind of variable that is used in probability theory and its applications.

Other notational usages. Some of the most common usages: (大赞!!!)

a, b, c, and d (sometimes extended to e and f) often represent parameters or coefficients.
a0, a1, a2, ... play a similar role, when otherwise too many different letters would be needed.
ai or ui is often used to denote the i-th term of a sequence or the i-th coefficient of a series.
f and g (sometimes h) commonly denote functions.
i, j, and k (sometimes l or h) are often used to denote varying integers or indices in an indexed family.
l and w are often used to represent the length and width of a figure.
n usually denotes a fixed integer, such as a count of objects or the degree of an equation.
When two integers are needed, for example for the dimensions of a matrix, one uses commonly m and n.
p often denotes a prime numbers or a probability.
q often denotes a prime power or a quotient
r often denotes a remainder.
x, y and z usually denote the three Cartesian coordinates of a point in Euclidean geometry. By extension, they are used to name the corresponding axes.
z typically denotes a complex number, or, in statistics, a normal random variable.
α, β, γ, θ and φ commonly denote angle measures.
ε usually represents an arbitrarily small positive number.
ε and δ commonly denote two small positives.
λ is used for eigenvalues.
σ often denotes a sum, or, in statistics, the standard deviation.

Mathematical notation

The 18th and 19th centuries saw the creation and standardization of mathematical notation as used today. Euler was responsible for many of the notations in use today: the use of a, b, c for constants and x, y, z for unknowns, e for the base of the natural logarithm, sigma (Σ) for summation, i for the imaginary unit, and the functional notation f(x). He also popularized the use of π for Archimedes constant (due to William Jones’ proposal for the use of π in this way based on the earlier notation of William Oughtred). Many fields of mathematics bear the imprint of their creators for notation: the differential operator is due to Leibniz, the cardinal infinities to Georg Cantor (in addition to the lemniscate (∞) of John Wallis), the congruence symbol (≡) to Gauss, and so forth.

Bijection

In mathematics, a bijection (or bijective function or one-to-one correspondence) is a function between the elements of two sets, where every element of one set is paired with exactly one element of the other set, and every element of the other set is paired with exactly one element of the first set. There are no unpaired elements. In formal mathematical terms, a bijective function f: X → Y is a one to one and onto mapping of a set X to a set Y.

A bijection from the set X to the set Y has an inverse function from Y to X. If X and Y are finite sets, then the existence of a bijection means they have the same number of elements. For infinite sets the picture is more complicated, leading to the concept of cardinal number (基数), a way to distinguish the various sizes of infinite sets.

A bijective function from a set to itself is also called a permutation (置换).

Bijective functions are essential to many areas of mathematics including the definitions of isomorphism, homeomorphism, diffeomorphism, permutation group, and projective map.

Parallelepiped

In geometry, a parallelepiped is a three-dimensional figure formed by six parallelograms (the term rhomboid is also sometimes used with this meaning). By analogy, it relates to a parallelogram just as a cube relates to a square or as a cuboid to a rectangle. In Euclidean geometry, its definition encompasses all four concepts (i.e., parallelepiped, parallelogram, cube, and square). In this context of affine geometry, in which angles are not differentiated, its definition admits only parallelograms and parallelepipeds. Three equivalent definitions of parallelepiped are

a polyhedron with six faces (hexahedron), each of which is a parallelogram,

“Parallelepiped” is now usually pronounced /ˌpærəlɛlɨˈpɪpɛd/, /ˌpærəlɛlɨˈpaɪpɛd/, or /-pɨd/; traditionally it was /ˌpærəlɛlˈɛpɨpɛd/ parr-ə-lel-ep-i-ped in accordance with its etymology in Greek παραλληλ-επίπεδον, a body “having parallel planes”.

Parallelepipeds are a subclass of the prismatoids (a polyhedron that has all of its vertices in two parallel planes).

Lemniscate

Galois theory

In mathematics, more specifically in abstract algebra, Galois theory, named after Évariste Galois, provides a connection between field theory and group theory. Using Galois theory, certain problems in field theory can be reduced to group theory, which is in some sense simpler and better understood.

Originally, Galois used permutation groups to describe how the various roots of a given polynomial equation are related to each other. The modern approach to Galois theory, developed by Richard Dedekind, Leopold Kronecker and Emil Artin, among others, involves studying automorphisms of field extensions.

Further abstraction of Galois theory is achieved by the theory of Galois connections.

举例：

对 Quadric Equation the Galois group of the polynomial x2 − 4x + 1 consists of two permutations: the identity permutation which leaves A and B untouched, and the transposition permutation which exchanges A and B. It is a cyclic group of order two, and therefore isomorphic to Z/2Z.

Consider the polynomial: the Galois group is isomorphic to the Klein four-group.

Congruent

Quotient Space

If two vectors v1, v2 in Linear Space X are congruent modulo Y (a linear subspace of X), then v1, v2 and all other vectors congruent with them form a linear space, denoted by X/Y or X mod Y. （我写的，没有语法错误把？）

In linear algebra, the quotient of a vector space V by a subspace N is a vector space obtained by “collapsing” N to zero. The space obtained is called a quotient space and is denoted V/N (read V mod N or V by N).

Let X = R2 be the standard Cartesian plane, and let Y be a line through the origin in X. Then the quotient space X/Y can be identified with the space of all lines in X which are parallel to Y. That is to say that, the elements of the set X/Y are lines in X parallel to Y. This gives one way in which to visualize quotient spaces geometrically. （X 二维平面，Y 面上的一条直线（dim Y 还是 2），然后 X/Y 是所有的平行于那条直线的向量）

Another example is the quotient of Rn by the subspace spanned by the first m standard basis vectors. The space Rn consists of all n-tuples of real numbers (x1,…,xn). The subspace, identified with Rm, consists of all n-tuples such that the last n-m entries are zero: (x1,…,xm,0,0,…,0). Two vectors of Rn are in the same congruence class modulo the subspace if and only if they are identical in the last n−m coordinates. The quotient space Rn/ Rm is isomorphic to Rn−m in an obvious manner.

V 是 U，W 的 Direct Sum，然后有

dim V = dim U + dim V，以及

U = V/W

Prime – Symbol

The prime symbol ( ′ ), double prime symbol ( ″ ), and triple prime symbol ( ‴ ), etc., are used to designate several different units and for various other purposes in mathematics, the sciences, linguistics and music. The prime symbol should not be confused with the apostrophe （就是英文单引号 '）, single quotation mark, acute accent, or grave accent; the double prime symbol should not be confused with the double quotation mark（"）, the ditto mark, or the letter double apostrophe. The prime symbol is very similar to the Hebrewgeresh, but in modern fonts the geresh is designed to be aligned with the Hebrew letters and the prime symbol not, so they should not be interchanged.

∂

The character ∂(\(\partial\)) (html element: &#8706; or &part;, unicode: U+2202) or is a stylized d mainly used as a mathematical symbol to denote a partial derivative such as \(\frac{\partial z}{\partial x}\) (read as “the partial derivative of z with respect to x”). The symbol was originally introduced by Legendre in 1786, but only gained popularity when it was used by Jacobi in 1841.

∂ is also used to denote the following:

The Jacobian, \(\frac{\partial (x,y,z)}{\partial (u,v,w)}\)

The boundary of a set in topology. （比如 Manifold of M is denoted as ∂M）

The boundary operator on a chain complex in homological algebra.

The boundary operator of a differential graded algebra.

The Dolbeault operator on complex differential forms.

The symbol may be referred to as “del”, “dee”, “partial dee”, or “partial”. （读法）

UTF-8

The Internationally defined Standard ISO/IEC 10646, Universal Character Set (UCS) know as UTF-8 (Universal Character Set + Transformation Format—8-bit) is a variable-width encoding that can represent every character in the Unicode character set. It was designed for backward compatibility（后向兼容） with ASCII and to avoid the complications（ 并发症） of endianness（字节顺序） and byte order marks in UTF-16 and UTF-32.

UTF-8 has become the dominant character encoding for the World Wide Web, accounting for more than half of all Web pages. The Internet Mail Consortium (IMC) recommends that all e-mail programs be able to display and create mail using UTF-8. The W3C recommends UTF-8 as default encoding in their main standards (XML and HTML).

The official IANA code for the UTF-8 character encoding is UTF-8.

The UTF-8 BOM is a sequence of bytes (EF BB BF) that allows the reader to identify the file as an UTF-8 file.

Normally, the BOM is used to signal the endianness of the encoding, but since endianness is irrelevant to UTF-8, the BOM is unnecessary.

According to the Unicode standard, the BOM for UTF-8 files is not recommended:

Mutatis Mutandis

Mutatis mutandis is a Latin phrase meaning “changing [only] those things which need to be changed” or more simply “[only] the necessary changes having been made”.

The phrase carries the connotation that the reader should pay attention to differences between the current statement and a previous one, although they are analogous. (For example, in writing about appropriate forms of dress in biblical times, the New Testament generally refers to females in considering immodesty and extravagance in dress; but, analogously, the same can be applied, mutatis mutandis [“changing only those things which need to be changed,” namely, the sex of the person referred to], to men also.) It can be understood as meaning “acknowledging the difference between the two” or (more succinctly（简便地）) as “acknowledging differences”. This term is used frequently in economics, philosophy, logic, and law, to parameterize a statement with a new term, or note the application of an implied, mutually understood set of changes. The phrase is also used in the study of counter-factuals, wherein the requisite change in the factual basis of the past is made and the resulting causalities are followed.

M3U

M3U is a computer file format that contains multimedia playlists. It originally was designed for audio files, such as MP3, but various software now uses it to play video file lists. M3U’s can also point a media player to an online streaming audio source. Numerous media players and software applications supports the M3U file format.

Phonetics

AMS - American Mathematical Society

The American Mathematical Society (AMS) is an association of professional mathematicians dedicated to the interests of mathematical research and scholarship, and serves the national and international community through its publications, meetings, advocacy（辩护） and other programs.

The society is one of the four parts of the Joint Policy Board for Mathematics (JPBM) and a member of the Conference Board of the Mathematical Sciences (CBMS).

The AMS was an early advocate of the typesetting program TeX, requiring that contributions be written in it and producing its own packages AMS-TeX and AMS-LaTeX. TeX and LaTeX are now ubiquitous（无所不在的） in mathematical publishing.

Hash Mark

Number Sign

Number sign is a name for the symbol #, which is used for a variety of purposes, including (mainly in the United States) the designation（指示） of a number (for example, “#1” stands for “number one”). In recent years, it has been used for “hashtagging” on social media websites.

The term number sign is most commonly used when the symbol is used before a number. In the United States, it is sometimes known as the pound sign, and has been traditionally used in the food industry as an abbreviation for pounds avoirdupois（常衡）. Outside of North America the symbol is called hash and the corresponding telephone key is called the “hash key” (and the term “pound sign” usually describes the British currency symbol “£”). The symbol is defined in Unicode as U+0023 # number sign (HTML: # as in ASCII).

The symbol may be confused with the musical symbol called sharp (♯). In both symbols, there are two pairs of parallel lines. The main difference is that the number sign has two horizontal strokes while the sharp sign has two slanted parallel lines which must rise from left to right, in order to avoid being obscured by the horizontal musical staff lines.

Exclamation Mark

The exclamation mark or exclamation point is a punctuation mark usually used after an interjection or exclamation to indicate strong feelings or high volume (shouting), and often marks the end of a sentence. Example: “Watch out!” Similarly, a bare exclamation mark (with nothing before or after) is often used in warning signs.

The mark can also be used at the beginning of a word instead of at the end. For example, several computer languages use “!” for logical negation; e.g. “!A” means “the logical negation of A”, also called “not A”. There are many other specialized uses of this mark, such as in mathematics where it denotes the factorial operation.

In the Geek Code version 3, “!” is used before a letter to denote that the geek refuses to participate in the topic at hand. In some cases, it has an alternate meaning, such as G! denoting a geek of no qualifications, !d denoting not wearing any clothes, P! denoting not being allowed to use Perl, and so on. They all share some negative connotations however.

Hashtag

A hashtag is a word or an unspaced phrase prefixed with the number sign (“#”). It is a form of metadata tag. Words in messages on microblogging and social networking services such as Twitter, Facebook, Google+, VK or Instagram may be tagged by putting “#” before them, either as they appear in a sentence, (e.g., “New artists announced for #SXSW2014 Music Festival”) or appended to it. The term “hashtag” can also refer to the hash symbol itself when used within the context of reciting a hashtag.

Hashtags make it possible to group such messages, since one can search for the hashtag and get the set of messages that contain it. A hashtag is only connected to a specific medium and can therefore not be linked and connected to pictures or messages from different platforms.

Because of its widespread use, the word was added to the Oxford English Dictionary in June 2014.

“Render unto Caesar” is the beginning of a phrase attributed to Jesus in the synoptic （对观福音书的）gospels（福音书）, which reads in full, “Render unto Caesar the things that are Caesar’s, and unto God the things that are God’s” (Ἀπόδοτε οὖν τὰ Καίσαρος Καίσαρι καὶ τὰ τοῦ Θεοῦ τῷ Θεῷ)

This phrase has become a widely quoted summary of the relationship between Christianity and secular（世俗） authority. The original message, coming in response to a question of whether it was lawful for Jews to pay taxes to Caesar, gives rise to multiple possible interpretations about the circumstances under which it is desirable for the Christian to submit to earthly authority.

Moment

A distribution with negative excess kurtosis is called platykurtic, or platykurtotic. “Platy-” means “broad”. In terms of shape, a platykurtic distribution has a lower, wider peak around the mean and thinner tails.

This leads to the equivalent characterization: a matrix Q is orthogonal if its transpose is equal to its inverse:

\[Q^\mathrm{T}=Q^{-1}, \,\]

An orthogonal matrix Q is necessarily invertible (with inverse \(Q^{-1} = Q^T\)), unitary (\(Q^{-1} = Q^*\)) and therefore normal (\(Q^*Q = QQ^*\)) in the reals. The determinant of any orthogonal matrix is either +1 or −1. As a linear transformation, an orthogonal matrix preserves the dot product of vectors, and therefore acts as an isometry of Euclidean space, such as a rotation or reflection. In other words, it is a unitary transformation.

The set of n × n orthogonal matrices forms a group O(n), known as the orthogonal group. The subgroup SO(n) consisting of orthogonal matrices with determinant +1 is called the special orthogonal group, and each of its elements is a special orthogonal matrix. As a linear transformation, every special orthogonal matrix acts as a rotation.

Maki Ohguro 大黑摩季

Maki Ohguro (大黒 摩季 Ōguro Maki?) is a Japanese pop singer and songwriter from Sapporo, Hokkaido.

In 1989, she passed the ‘3rd BAD’ audition. Her famous songs are “DA・KA・RA”, “Chotto”, and so on… Her second single “DA・ka・RA” sold 1.1 million copies and won the ‘Japan Record Grand Prix’ newcomer award of the year. Because of her rare public appearances, she was originally known as a phantom singer, like Izumi Sakai of Zard. “Anata Dake Mitsumeteru”, the ending theme for Slam Dunk（灌篮高手啊亲）, was the number 2 song for the month of January 1994, and is certified as a Million record, selling 1,087,160 copies.

玛莉特 Marit Larsen

Marit Elisabeth Larsen (born 1 July 1983) is a Norwegian singer and songwriter. She began playing violins at age of 5, and played it until the age of 8. She gained international fame during her teenage years as a member of the pop duo（二重唱） M2M with childhood friend Marion Raven. More recently she has pursued her own music career releasing her solo debut album, Under the Surface, in 2006. Her second album, The Chase, was released in Norway in October 2008. The third album, titled Spark was released in Norway, Denmark, Sweden, Finland on 18 November 2011 and Germany, Austria, Switzerland on 16 December 2011.

If A Song Could Get Me You，太喜欢这首歌了~

M2M

M2M was a pop music duo formed by two Norwegians, Marion Elise Raven and Marit Elisabeth Larsen. They released three albums under Warner Music Norway: Shades of Purple, The Big Room, and The Day You Went Away: The Best of M2M, a greatest hits album released by their record label after they disbanded.

Raven and Larsen come from Lørenskog in the district east of Oslo. They had known each other since the age of five. Discovered by the Norwegian music producers Kenneth M. Lewis and Kai Robøle, the girls were signed to Atlantic Records in 1998. The name “M2M” was chosen from a contest held for fans to give a name to the band, having been previously known as Marion & Marit.

The Eagles

The Eagles are an American rock band formed in Los Angeles in 1971 by Glenn Frey, Don Henley, Bernie Leadon and Randy Meisner. With five number-one singles, six Grammy Awards, five American Music Awards and six number one albums, the Eagles were one of the most successful musical acts of the 1970s. At the end of the 20th century, two of their albums, Their Greatest Hits (1971–1975) and Hotel California, were ranked among the 20 best-selling albums in the U.S. according to the Recording Industry Association of America. Hotel California is ranked 37th in Rolling Stone’s list of “The 500 Greatest Albums of All Time” and the band was ranked number 75 on the magazine’s 2004 list of the 100 Greatest Artists of All Time.

They are one of the world’s best-selling bands of all time, having sold over 150 million records[7]—100 million in the U.S. alone—including 42 million copies of Their Greatest Hits (1971–1975) and 32 million copies of Hotel California. They are the fifth-highest-selling music act and highest-selling American band in US history. No American band sold more records than the Eagles during the 1970s.

The Eagles released their self-titled debut album in 1972, which spawned three top 40 singles: “Take It Easy”, “Witchy Woman” and “Peaceful Easy Feeling”. Their next album, Desperado (1973), was less successful than the first, reaching only number 41 on the charts; neither of its singles reached the top 40. However, the album contained two of the band’s most popular tracks: “Desperado” and “Tequila Sunrise”. They released On the Border in 1974, adding guitarist Don Felder midway through the recording of the album. The album generated two top 40 singles: “Already Gone” and their first number one, “Best of My Love”.

It was not until 1975’s One of These Nights that the Eagles became arguably America’s biggest band. The album included three top 10 singles: “One of These Nights”, “Lyin’ Eyes” and “Take It to the Limit”, the first hitting the top of the charts. They continued that success and hit their commercial peak in late 1976 with the release of Hotel California, which would go on to sell over 16 million copies in the U.S. alone and over 32 million copies worldwide. The album yielded two number-one singles, “New Kid in Town” and “Hotel California”. They released their last studio album for nearly 28 years in 1979 with The Long Run, which spawned three top 10 singles: “Heartache Tonight”, “The Long Run” and “I Can’t Tell You Why”, the lead single being another chart-topping hit.

The Eagles disbanded in July 1980 but reunited in 1994 for the album Hell Freezes Over, a mix of live and new studio tracks. They have toured intermittently since then and were inducted into the Rock and Roll Hall of Fame in 1998. In 2007, the Eagles released Long Road Out of Eden, their first full studio album in 28 years and their sixth number one album. The next year they launched the Long Road Out of Eden Tour in support of the album. In 2013, they began the extended History of the Eagles Tour in conjunction with the band’s documentary release, History of the Eagles.

R.Kelly

Leonard Cohen

Leonard Norman Cohen, CC GOQ (born 21 September 1934) is a Canadian singer-songwriter, musician, poet, and novelist. His work has explored religion, politics, isolation, sexuality, and personal relationships. Cohen has been inducted into the American Rock and Roll Hall of Fame and both the Canadian Music Hall of Fame and the Canadian Songwriters Hall of Fame. He is also a Companion of the Order of Canada, the nation’s highest civilian honour. In 2011, Cohen received a Prince of Asturias Award for literature.

The critic Bruce Eder assessed Cohen’s overall career in popular music by asserting that “[he is] one of the most fascinating and enigmatic … singer/songwriters of the late ’60s … [and] has retained an audience across four decades of music-making … Second only to Bob Dylan (and perhaps Paul Simon) [in terms of influence], he commands the attention of critics and younger musicians more firmly than any other musical figure from the 1960s who is still working at the outset of the 21st century.”

The Academy of American Poets has commented more broadly on Cohen’s overall career in the arts, including his work as a poet, novelist, and songwriter, stating that “[Cohen’s] successful blending of poetry, fiction, and music is made most clear in Stranger Music: Selected Poems and Songs, published in 1993, which gathered more than 200 of Cohen’s poems … several novel excerpts, and almost 60 song lyrics … While it may seem to some that Leonard Cohen departed from the literary in pursuit of the musical, his fans continue to embrace him as a Renaissance man who straddles the elusive artistic borderlines.”

Cohen will release his 13th studio album, Popular Problems, on Columbia Records a day after his 80th birthday on September 22, 2014.

Alan Kay

Steve Wozniak

Men List: 05 (数学家特别版 01)

Leonhard Euler

David Hilbert

Kurt Gödel

Kurt Friedrich Gödel (/ˈkɜrt ɡɜrdəl/; German: [ˈkʊʁt ˈɡøːdəl] ; April 28, 1906 – January 14, 1978) was an Austrian, and later American, logician, mathematician, and philosopher. Considered with Aristotle and Gottlob Frege to be one of the most significant logicians in history, Gödel made an immense impact upon scientific and philosophical thinking in the 20th century, a time when others such as Bertrand Russell, A. N. Whitehead, and David Hilbert were pioneering the use of logic and set theory to understand the foundations of mathematics.

“I’m sorry, I just use it(writing emacs lisp) as a way to relax, sometimes.”

“It’s my hobby. Like others people would do wood knits or something”

“I actually want my computer to work exactly as how I wanted.”

Thomas Kjeldahl Nilsson

Avdi Grimm (Org-mode, Ruby, etc.)

John Wiegley

Jamie Zawinski

Lisp hacker, early Netscape developer, and nightclub owner Jamie Zawinski, a.k.a. jwz, is a member of the select group of hackers who are as well known by their three-letter initials as by their full names.

“Ptthh, wrong!” and he’d walk away. So that was kind of getting thrown in the deep end. It was like the Zen approach – the master hit me with a stick, now I must meditate.

“Oh my god; now I’m trying to debug GDB, which I’ve never looked at before.”

We spent a long time talking about features. Well, not a long time, but it seemed like a long time because we were living a week every day. We stripped features, definitely. We had a whiteboard; we scribbled ideas; we crossed them out. This was a group of like six or seven people. I don’t remember exactly the number. A bunch of smart, egotistical people sitting in a room yelling at each other for a week or so.

In some ways, yeah. Programming is obviously much more rigid. But as far as the overall ability to express a thought, they’re very similar. Not rambling, having an idea in your head of what you’re trying to say, and then being concise about it. I think that kind of thinking is the overlap between programming and writing prose.

When I’m just writing the first version of the program, I tend to put everything in one file. And then I start seeing structure in that file. Like there’s this block of things that are pretty similar. That’s a thousand lines now, so why don’t I move that into another file. And the API sort of builds up organically that way. The design process is definitely an ongoing thing; you never know what the design is until the program is done. So I prefer to get my feet wet as early as possible; get something on the screen so I can look at it sideways.

We had to ship the thing even if it wasn’t perfect. We can ship it later and it would be higher quality but someone else might have eaten our lunch by then.

I always wish people would comment more, though the thing that makes me cringe is when the comment is the name of the function rephrased. Function’s called push_stack and the comment says, “This pushes to the stack.” Thank you.

You’ve got to say in the comment something that’s not there already. What’s it for? Either a higher-level or a lower-level description, depending on what’s most important. Sometimes the most important thing is, what is this for? Why would I use it? And sometimes the most important thing is, what’s the range of inputs that this expects?

Long variable names. I’m not a fan of Hungarian notation, but I think using actual English words to describe things, except for loop iterators, where it’s obvious. Just as much verbosity as possible, I guess.

I usually end up putting the leaf nodes up at the top of the file—try to keep it basically structured that way. And then usually up at the top, document the API. What are the top-level entry points of this file, this module, whatever? With an object-y language, that’s done by the language for you. With C you’ve got to be a little more explicit about that. In C I do tend to try to have a .h file for every .c file that has all the externs for it. And anything that’s not exported in the .h file is static. And then I’ll go back and say, “Wait, I need to call that,” and I change it. But you’re doing that explicitly rather than just by accident.

Sometimes. Normally I would think that someone who is a big fan of C++ templates—keep me away from that guy. But that might just be a snap judgment on my part. Maybe in the context they’ve used them, they actually work fine. Certainly with the folks I’ve worked with, ability to argue their point was important because we all ended up being a pretty argumentative bunch. With that environment, that helped a lot. That certainly doesn’t have anything to do with programming ability. That’s just interpersonal-dynamics stuff.

I know I ended up doing a lot of reading of code and asking questions. I think one thing that’s really important is to not be afraid of your ignorance. If you don’t understand how something works, ask someone who does. A lot of people are skittish about that. And that doesn’t help anybody. Not knowing something doesn’t mean you’re dumb—it just means you don’t know it yet.

So there were definitely times, especially early on, where I felt like, “Oh my god, I don’t know anything.” It would just be embarrassing—but that was just being insecure. Being the young kid around all these people with PhDs— “Aaah, I don’t know anything! I’m an idiot! How did I bluff my way into this?”

That just seemed bizarre and wrong. But I don’t know. Maybe it’s not wrong. Maybe that’s the caveman thoughts: “Back in my day, we programmed with a nine-volt battery and a steady hand!”

I actually haven’t read very many of those. The one I always recommend is Structure and Interpretation of Computer Programs, which a lot of people are afraid of because it’s Lispy, but I think does a really good job of teaching programming without teaching a language.

Seibel: Is there a key skill programmers must have?

Zawinski: Well, curiosity – taking things apart. Wanting to know what’s going on under the hood. I think that’s really the basis of it. Without that I don’t think you get very far. That’s your primary way of acquiring knowledge. Taking something apart and looking at it is how you learn to build your own. At least for me. I’ve read very few books about computers. My experience has been digging through source code or reference manuals. I’ve got a goal and, alright, to do this I need to know what this thing does and what this thing does. And I’ll just sort of random-walk through that until I find where I’m going.

# Converts from one data type to another# Converts shapefile to KMLogr2ogr -f KML -dsco NameField=Name counties.kml ut_counties.shp
# Convert a KML file to a shapefile and reprojectogr2ogr -f "ESRI Shapefile" -s_srs "EPSG:4326" -t_srs "EPSG:26912" counties_utm.shp counties.kml
# Copy just a subset of fields with –selectogr2ogr -f KML -select name,state_name counties1.kml ut_counties.shp
# Can use some of the same switches as with ogrinfo, like# Limit by attribute with –where# Limit by spatial extent with –spat# Use –append to append to an existing file

gdalinfo

# Prints info about a raster data set
gdalinfo raster.img
# See the documentation for ways to suppress some of the info

, and - text tool - The ultimate power tool of Inkscape is the XML editor

[Shapes tutorial(http://inkscape.org/doc/shapes/tutorial-shapes.html)

Rectangle: F4

Ellipse: F5

Star

Spiral

Conclusion

Inkscape’s shape tools are very powerful. Learn their tricks and play with them at your leisure — this will pay off when you do your design work, because using shapes instead of simple paths often makes vector art faster to create and easier to modify.

Chinese or Oriental This tutorial focuses mainly on Western calligraphy, as the other two styles tend to use a brush (instead of a pen with nib), which is not how our Calligraphy tool currently functions.

Angle & Fixation

fixed angle

fixed angle

Tremor

Wiggle & Mass

Calligraphy is not only fun; it’s a deeply spiritual art that may transform your outlook on everything you do and see. Inkscape’s calligraphy tool can only serve as a modest introduction. And yet it is very nice to play with and may be useful in real design. Enjoy!

§3. Numeric Computing with IPython

before we start this chapter: 1. run ipython notebook in console 2. Go to http://127.0.0.1:8888/ 3. Import notebook: Leaing_IPython/Chapter 03/9932_03_{01,02,03}.ipynb See how to do it, Pic 01, Pic 02 (my screenshots)

provides end-to-end communication services based either on TCP(connection-oriented) or UDP(connectionless)

Internet

specify the use of IP, ICMP, and Internet Group Management Protocol. Operationally, this is a connectionless “best effort” protocol concerned with addressing, type of service, security, and fragmentation. It relies on upper-layer protocols for accurate delivery.

Link Layer

This is the network interface, and includes framing and media access to communicate directly with the network to which it is attached.

Encapsulation is the method by which the various layers interact and pass information up and down the protocol stack.

Addressing

Equipment

Review Questions

Q: What is the name of the process by which an upper-layer protocol is wrapped up in a lower-layer protocol?
A: Encapsulation
Q: Name four communication models.
A: TCP/IP, OSI, SNA, Appletalk, Novell (IPX/SPX)
Q: What two documents specify the standardization of the OSI model?
A: ISO/IEC 7498 and ITU-T X.200
Q: How many layers are in the OSI and TCP/IP models, respectively?
A: 7, 5
Q: Name the layers of the OSI model.
A: Application, Presentation, Session, Transport, Network, Data Link, Physical
Q: Name the layers of the TCP/IP model.
A: Application, Transport, Internet, Data Link, Physical

Some people refer to the branching model in Git as its “killer feature”. Unlike many other VCSs, Git encourages a workflow that branches and merges often, even multiple times in a day. Understanding and mastering this feature gives you a powerful and unique tool and can literally change the way that you develop.

with open(filename) as fr
reader = csv.reader(fr, dialect=csv.excel_tab)
with open(filename, 'wb') as fw
writer = csv.writer(fw, dialect=csv.excel_tab)
# 'r': reading, 'w': writing(truncate), 'b': binary, more robust
# 'r+', 'w+' and 'a+', updating
### work with dirty file ###
datafile = 'ch02-data-dirty.tab'
with open(datafile, 'r') as f:
for line in f:
# removed next comment to see line before cleanup
print line.split('\t'), "____dirty way"
# we remove any space in line start or end
line = line.strip()
# now we split the line by tab delimiter
print line.split('\t')

“Cold turkey” describes the abrupt cessation of a substance dependence and the resulting unpleasant experience, as opposed to gradually easing the process through reduction over time or by using replacement medication.

XCAPE
=====
xcape allows you to use a modifier key as another key when pressed and
released on its own. Note that it is slightly slower than pressing the
original key, because the pressed event does not occur until the key is
released. The default behaviour is to generate the Escape key when Left
Control is pressed and released on its own. (If you don't understand why
anybody would want this, I'm guessing that Vim is not your favourite text
editor ;)
Minimal building instructions
-----------------------------
$ sudo apt-get install git gcc make pkg-config libx11-dev libxtst-dev libxi-dev
$ mkdir xcape
$ cd xcape
$ git clone https://github.com/alols/xcape.git .
$ make
Usage
-----
$ xcape [-d] [-t <timeout ms>] [-e <map-expression>]
### `-d`
Debug mode. Does not fork into the background.
### `-t <timeout ms>`
If you hold a key longer than this timeout, xcape will not generate a key
event. Default is 500 ms.
### `-e <map-expression>`
The expression has the grammar `'ModKey=Key[|OtherKey][;NextExpression]'`
The list of key names is found in the header file `X11/keysymdef.h` (remove
the `XK_` prefix). Note that due to limitations of X11 shifted keys *must*
be specified as a shift key followed by the key to be pressed rather than
the actual name of the character. For example to generate "{" the
expression `'ModKey=Shift_L|bracketleft'` could be used (assuming that you
have a key with "{" above "[").
You can also specify ModKey in decimal (prefix `#`), octal (`#0`), or
hexadecimal (`#0x`). It will be interpreted as a keycode unless no corresponding
key name is found.
#### Examples
+ This will make Left Shift generate Escape when pressed and released on
it's own, and Left Control generate Ctrl-O combination when pressed and
released on it's own.
xcape -e 'Shift_L=Escape;Control_L=Control_L|O'
+ In conjugation with xmodmap it is possible to make an ordinary key act
as an extra modifier. First map the key to the modifier with xmodmap
and then the modifier back to the key with xcape. However, this has
several limitations: the key will not work as ordinary until it is
relased, and in particular, *it may act as a modifier unintentionally if
you type too fast.* This is not a bug in xcape, but an unavoidable
consequence of using these two tools together in this way.
As an example, we can make the space bar work as an additional ctrl
key when held (similar to
[Space2ctrl](https://github.com/r0adrunner/Space2Ctrl)) with the
following sequence of commands.
# Map an unused modifier's keysym to the spacebar's keycode and make it a
# control modifier. It needs to be an existing key so that emacs won't
# spazz out when you press it. Hyper_L is a good candidate.
spare_modifier="Hyper_L"
xmodmap -e "keycode 65 = $spare_modifier"
xmodmap -e "remove mod4 = $spare_modifier" # hyper_l is mod4 by default
xmodmap -e "add Control = $spare_modifier"
# Map space to an unused keycode (to keep it around for xcape to
# use).
xmodmap -e "keycode any = space"
# Finally use xcape to cause the space bar to generate a space when tapped.
xcape -e "$spare_modifier=space"
Note regarding xmodmap
----------------------
If you are in the habit of remapping keycodes to keysyms (eg, using xmodmap),
there are two issues you may encounter.
1. You will need to restart xcape after every time you modify the mapping from
keycodes to keysyms (eg, with xmodmap), or xcape will still use the old
mapping.
2. The key you wish to send must have a defined keycode. So for example, with
the default mapping `Control_L=Escape`, you still need an escape key defined
in your xmodmap mapping. (I get around this by using 255, which my keyboard
cannot send).
Contact
-------
Find the latest version at
https://github.com/alols/xcape
The author can be reached at
albin dot olsson at gmail dot com

題外話

Infinity 60% FAQ

Does the Infinity 60% Kit have backlighting? Are there plans for backlighting? No, the Infinity 60% Kit does not support backlighting. No, There are no plans for the Infinity 60% to support backlighting.

一直覺得鍵盤燈很傻馬特（當然晚上確實有點實際作用）。

Does the Infinity 60% Kit have NKRO? Yes. The Infinity 60% Kit has NKRO by default on most operating systems including Mac OSX. The 6KRO compatibility mode may be explicitly toggled via the firmware if needed. 6KRO is very sufficient for me.

這個是必須的。牛逼的是它可以從硬件上 toggle 這個特性……

Is the Infinity 60% programmable? How do I reprogram my Infinity 60% to a different layout? Yes, the Infinity 60% is fully programmable. Use the web configurator to download the hex files and flash it on to the keyboard or download and compile KLL on your own. TMK firmware is also compatible with the Infinity 60%.